]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
crypto: tesmgr - allow authenc(hmac(sha224/sha384),cbc(aes)) in fips mode
authorAleksander Jan Bajkowski <olek2@wp.pl>
Fri, 6 Feb 2026 19:26:59 +0000 (20:26 +0100)
committerHerbert Xu <herbert@gondor.apana.org.au>
Sat, 28 Feb 2026 03:53:58 +0000 (12:53 +0900)
The remaining combinations of AES-CBC and SHA* have already been marked
as allowed. This commit does the same for SHA224 and SHA384.

Signed-off-by: Aleksander Jan Bajkowski <olek2@wp.pl>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
crypto/testmgr.c

index 49b607f65f636387d2d4c7ade028668e88533b8e..9f41e7b50edc4c123c5fa5f1948d985516473969 100644 (file)
@@ -4134,6 +4134,7 @@ static const struct alg_test_desc alg_test_descs[] = {
                .alg = "authenc(hmac(sha224),cbc(aes))",
                .generic_driver = "authenc(hmac-sha224-lib,cbc(aes-generic))",
                .test = alg_test_aead,
+               .fips_allowed = 1,
                .suite = {
                        .aead = __VECS(hmac_sha224_aes_cbc_tv_temp)
                }
@@ -4196,6 +4197,7 @@ static const struct alg_test_desc alg_test_descs[] = {
                .alg = "authenc(hmac(sha384),cbc(aes))",
                .generic_driver = "authenc(hmac-sha384-lib,cbc(aes-generic))",
                .test = alg_test_aead,
+               .fips_allowed = 1,
                .suite = {
                        .aead = __VECS(hmac_sha384_aes_cbc_tv_temp)
                }